StartDownload
_WorkProc@4
__mp@4
Static task
static1
Behavioral task
behavioral1
Sample
1fe43a08873d75a4f7b96c41c0bca7c4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fe43a08873d75a4f7b96c41c0bca7c4.exe
Resource
win10v2004-20231215-en
Target
1fe43a08873d75a4f7b96c41c0bca7c4
Size
27KB
MD5
1fe43a08873d75a4f7b96c41c0bca7c4
SHA1
42624ee727995b5519a92560fd26a0ae13e0c429
SHA256
7b9f1b922341415428689b6db1bd0f44e02f1aaf66e3011403ab07f36fca0602
SHA512
afde3baee3a57df1da3f8970f991eecbc15d832e18ac57c70e03cbd0ee7edba3638829d00ecce5fd2d9d123ed08a526871c3640898ad9e324493a9fd77798078
SSDEEP
768:F/SS5rWlwDb03x2s8uB1xezO4Mo8yNm7OlnnUr2ZB:FpilgI3x2yA8yNm7wnUSB
Checks for missing Authenticode signature.
resource |
---|
1fe43a08873d75a4f7b96c41c0bca7c4 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WSAStartup
WSACleanup
ioctlsocket
gethostbyname
SHDeleteKeyA
lstrcmpiA
lstrcpyA
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
lstrcatA
lstrlenA
WritePrivateProfileStringA
GetPrivateProfileSectionNamesA
Sleep
PulseEvent
CreateThread
HeapFree
GetTickCount
GetCurrentThreadId
UnmapViewOfFile
WaitForSingleObject
GetLastError
CreateEventA
lstrcmpA
FreeLibrary
LoadLibraryA
lstrcpynA
CloseHandle
OpenEventA
MapViewOfFileEx
CreateFileMappingA
VirtualAlloc
VirtualFree
GetProcAddress
VirtualProtect
HeapReAlloc
OutputDebugStringA
FlushInstructionCache
WriteProcessMemory
VirtualProtectEx
GetThreadContext
ResumeThread
DuplicateHandle
CreateRemoteThread
OpenProcess
CreateProcessA
GetCurrentProcess
GetVersionExA
Process32Next
Process32First
CreateToolhelp32Snapshot
VirtualAllocEx
IsBadReadPtr
GetProcessHeap
VirtualQuery
OpenFile
SetFileTime
GetFileTime
CreateFileA
GetFileAttributesA
GetSystemDirectoryA
DeleteFileA
WinExec
GetWindowsDirectoryA
CopyFileA
MapViewOfFile
SetLastError
RemoveDirectoryA
ExitProcess
TerminateThread
GetCurrentThread
HeapAlloc
SetThreadContext
GetMessageA
MessageBoxA
wsprintfA
TranslateMessage
DispatchMessageA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegEnumValueA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
GetTokenInformation
AdjustTokenPrivileges
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
SHGetSpecialFolderPathA
ShellExecuteA
InternetOpenA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
HttpQueryInfoA
InternetCanonicalizeUrlA
InternetCloseHandle
InternetCrackUrlA
InternetReadFile
InternetQueryDataAvailable
StartDownload
_WorkProc@4
__mp@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE